scispace - formally typeset
Open AccessJournal ArticleDOI

Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data

Zeyad Safaa Younus, +1 more
- 07 Feb 2019 - 
- Vol. 29, Iss: 1, pp 1216-1225
Reads0
Chats0
TLDR
The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578.
Abstract
Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.

read more

Citations
More filters
Journal ArticleDOI

Image steganography using exploiting modification direction for compressed encrypted data

TL;DR: A novel approach to steganography is suggested using Vigenere Cipher and Huffman Coding methods to encrypt and compress the mystery message content to raise the security and ensure the message content cannot be extracted without earlier knowledge of decrypting rules and the Huffman Dictionary Table.
Journal ArticleDOI

Analysis review on spatial and transform domain technique in digital steganography

TL;DR: The main mediums of digital steganography are identified, which are image-based, video-based and audio-based in order to recognize the various techniques used with them and the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT.
Book ChapterDOI

Modified Least Significant Bit Technique for Securing Medical Images

TL;DR: In this paper, a modified Least Significant Bit (LSB) algorithm implemented on a MATLAB 2018a programming environment is proposed to secure digital medical images being transmitted over the internet from being accessed by an intruder.
Journal ArticleDOI

Exponential fractional cat swarm optimization for video steganography

TL;DR: In this article, an effective method named Exponential Fractional-Cat Swarm Optimization (Exponential FFCSO) along with multi-objective cost function is proposed.
References
More filters
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI

Trends in steganography

TL;DR: Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Journal ArticleDOI

Image Encryption Using Random Bit Sequence Based on Chaotic Maps

TL;DR: The paper proposes an algorithm for image encryption using the random bit sequence generator and based on chaotic maps that produces encrypted image whose performance is evaluated using chi-square test, correlation coefficient, number of pixel of change rate (NPCR), unified average changing intensity (UACI), and key space.
Book ChapterDOI

Public-key steganography with active attacks

TL;DR: In this paper, a complexity-theoretic model for public-key steganography with active attacks is introduced and a relaxation called steganographic security against publicly-detectable replayable adaptive chosen-covertext attacks (SS-PDR-CCA) is formalized.
Related Papers (5)